0% found this document useful (0 votes)
48 views16 pages

ETECH 1st Grading Notes

This document provides an introduction to information and communication technology (ICT). It defines key terms like information, communication, and technology. It then discusses how ICT deals with using technologies like phones, computers, the Internet for locating, saving, sending and manipulating information. It highlights the importance of ICT in communication, daily life and a country's progress. It also provides details on ICT usage in the Philippines and introduces concepts like the Internet, World Wide Web, different types of web pages from Web 1.0 to 3.0. Finally, it discusses technologies like mobile media, assistive media, social media platforms and online safety risks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views16 pages

ETECH 1st Grading Notes

This document provides an introduction to information and communication technology (ICT). It defines key terms like information, communication, and technology. It then discusses how ICT deals with using technologies like phones, computers, the Internet for locating, saving, sending and manipulating information. It highlights the importance of ICT in communication, daily life and a country's progress. It also provides details on ICT usage in the Philippines and introduces concepts like the Internet, World Wide Web, different types of web pages from Web 1.0 to 3.0. Finally, it discusses technologies like mobile media, assistive media, social media platforms and online safety risks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

E-TECH NOTES | M1 LESSON 1 | INTRODUCTION TO INFORMATION AND COMMUNICATION

TECHNOLOGY

INFORMATION AND COMMUNICATION TECHNOLOGY

Information: facts provided or learned about something or somewhere

Communication: imparting or exchanging information or news

Technology: machinery and equipment developed from the application of scientific knowledge

Information and Communications Technology (ICT) often deals with the use of different
technologies such as mobile phones, telephones, computers, the Internet, and other devices, as
well as software applications to locate, save, send, and manipulate information.

Important in: Communication, Daily lives, and Country’s progress

ICT IN THE PHILIPPINES

- 119 million mobile phone subscriptions from a total population of 101 million and 47
million active Facebook accounts
- fastest growing app market in Southeast Asia and the highest digital population in the
world
- top online activities are social media, videos, online mobile games, location-based
search, and online shopping
- ICT Department in the Philippines is responsible for the planning, development and
promotion of the country’s information and communications technology (ICT) agenda in
support of national development.

❖ Philippines is dubbed as the “ICT Hub of Asia” because of huge growth of ICT-related jobs,
one of which is BPO, Business Process Outsourcing, or call centers.

❖ ICT Industry-19.3% employment share (2010)

❖ 106.8 cellphones per 100 Filipinos (2012)

❖ Makati City/Manila City/Cebu City – Selfie Capital of the World

❖ 258 selfie-takers per 100,000 people (Time Magazine, 2014)

INTERNET

A global system of interconnected computer networks that uses the Internet protocol suite
(TCP/IP) to communicate between networks and devices.
WORLD WIDE WEB

It is an information system on the Internet that allows documents to be connected to other


documents by hypertext links, enabling the user to search for information by moving from one
document to another

It is also known as WWW or W3 introduce by Tim Berners-Lee. It consists of different pages that
are formatted in a markup language called HTML (Hypertext Markup Language) and linked to
each other that contain text, graphics, multimedia files, hyperlinks etc.

Sir Tim Berners-Lee: He invented the World Wide Web in 1989. He is a British computer
scientist.

The World Wide Web browser software, such as Microsoft's Internet Explorer/Edge, Mozilla
Firefox, Opera, Apple's Safari, and Google Chrome, lets users navigate from one web page to
another via the hyperlinks embedded in the documents.

TYPES OF WEB PAGES

- Web 1.0 or The Web


- Web 2.0 or The Social Web
- Web 3.0 or Semantic Web

WEB 1.0 OR THE WEB

• It is the first stage of the World Wide Web evolution. It is a flat or stationary page since it
cannot be manipulated by the user.

• Webpages were static and were called read-only web.

• The only available feedback mechanism was through private emails.

• It is a term coined to differentiate the first stage of the World Wide Web (www) in comparison
with the present stage of the internet technology.

• At the beginning, there were few web content creators.

WEB 2.0 OR THE SOCIAL WEB


• It allows users to interact with the page, the user may be able to comment or create a user
account. Most websites that we visit today are Web 2.0.

• The internet became more available for everyone

• The term Web 2.0 was first used around 2004.

• Internet technology became more and more interactive.

• The users can now interact, contribute, and create their own internet space and content
(Explosion of Information & Social Media).

WEB 3.0 OR SEMANTIC WEB

• It provides a framework that allows data to be shared and reused to deliver web content
specifically targeting the user.

• It is described as read-write execute web BY Time Berners-Lee (Father of the WWW)

• Search Engines will learn about you and your habits from each search you perform and will
gather details about you from your previous activities like likes and social postings and present
the answers as per your preferences.

• The context of the search of the user is processed by a programming language to help the
user by presenting options of what the person is interested in.

• It will not make Web 2.0 obsolete


TECHNOLOGY CONVERGENCE

It is an evolution of technological developments that merge into a new system bringing


together different types of applications and media. It is the single most important example of
technological convergence.

MOBILE MEDIA

A range of handheld devices, from mobile phones, tablets, and e-readers to game consoles, are
primarily used as personal, interactive, Internet-abled and user controlled portable platforms
that allow interconnected users to exchange personal and non-personal information (Wei,
2013).

ASSISTIVE MEDIA

It is a nonprofit organization founded in 1996 in Michigan, USA. It was founded by David H.


Harvey. It is an Internet-delivered audio reading service for people with visual or perceptual
reading impairments. The produce and publish voice recorded written materials on cassettes,
CDs, and reading impairments.

SOCIAL MEDIA PLATFORM

A computer-mediated tools that allow large group of people to create, share or exchange
information, interest and the information shared can be in the form of ideas, pictures, videos or
anything that you want to create and share to virtual communities.

ONLINE PLATFORMS IN ICT

It makes it easier for users to interact, to collect, and use the data from the user’s interactions
for their own particular needs.

ONLINE PLATFORM CATEGORIES

- Social Media: YouTube, Twitter, Facebook, Pinterest, TikTok


- Communication Services: PLDT, Sky cable, Smart, Globe
- Advertising Platforms: LinkedIn, Facebook, YouTube
- Web Search Engine: Google, Bing, Yahoo, Mozilla Firefox
- Payment System: MasterCard, PayPal, Gcash
E-TECH NOTES | M1 LESSON 2 | ONLINE SAFETY. SECURITY, ETHICS, AND ETIQUETTE

INTERNET

 It is defined as the nformation superhighway.


 Anyone that has access to this highway, can place information, and can grab
information.

Types of Information with Risk:

 Mother’s and Father’s Name


 Sibling’s Name
 Address
 Home Phone Numbers
 Birthday
 Email Address
 First Name
 Last Name
 Middle Name
 Current and Previous School
 Cellphone Number

DANGERS ON THE INTERNET

Online Safety

The importance of internet plays a crucial part in human development. Life becomes easy and
comfortable because of this technology. Most of us are connected to the internet via laptop,
mobile phone, tablet, personal computer and other electronic gadgets. Behind this technology
there is a risk that everyone should be aware of. You could be at risk on scam, bullying, and
illegal activities if you will not take precautions in using internet. We need to keep ourselves
safe and secure whenever we use the internet. That is why it is very important to know and
learn the ways on how to be safe and secured online.

INTERNET RISK

Cyberbullying

- It happens when someone intentionally abused, harass, and mistreated by other person
using electronic communication.

Identity Theft

- It is a crime of stealing personal information for the purpose of assuming that person’s
name or identity to make any form of transactions.
Cyber Stalking

- A criminal practice where electronic communication is used to stalk or harass individual


or group.

Sexting

- The act of sending sexually explicit text messages, images, and videos.

INTERNET THREAT

MALWARE - Malicious code/ software, it is short for malicious software

Types of Malwares:

1. Computer Virus
2. Computer Worm
3. Trojan Horse
4. Spyware
5. Adware
6. Keylogger
7. Botnet
8. Rootkit
9. Ransomware

Computer Virus

• It is a program that duplicates/ replicates itself and then infects the computer.

• It spreads like a biological virus.

• It can be transferred by the use of removable storage media devices.

• Damages may be mild to severe.

Computer Worm

• It is a dangerous computer program that replicates itself through a network. Some worms
delete files, others disrupt the network function.

• It is usually spread through email and running of attachments from suspicious sources.

• It spreads by exploiting weaknesses in operating systems (but BLESS OS updates!)


Trojan Horse

• A malware fronting to perform a good task, but covertly performs undesirable function with
the intention of entering the computer without the user’s consent.

• It can disable the computer’s defenses, opening it to unauthorized entry. It can erase data, can
corrupt files, allow access to computer.

• A malicious program that disguised as legitimate program that user will accept and use but
take control of your computer.

Spyware

• It is a program that runs in the background without you knowing.

• It has the ability to monitor what you are currently doing and typing through keylogging.

• A malicious program that gathers information from victim’s computer and send it back to the
hacker.

Adware

• An unwanted advertisement that will pop-up several times on victim’s computer then behave
abnormally and tedious to close them.

• It is a program designed to send an advertisement, mostly as pop-ups.

Keylogger

A program that runs in the background and steals user credentials and confidential information
and send back to hack by recording every keystroke that a user makes on their computer or
device.

Botnet

A collection of infected internet–connected devices such as PC and mobile phone that are
controlled by a common type of malware.

Rootkit

A software tools used by hackers to gain control over a computer on a network without being
exposed.

Ransomware
A ransom virus that block the user from accessing the programs or files and demands to pay
the ransom through online method for the removal of the virus.

EMAIL SPAM

• Usually, unsolicited commercial email sent from an unknown source with identical message
sent to multiple recipients.

• Usually not dangerous but can be time and space consuming.

• Dangerous ones can carry viruses and other malicious software (Malware)

PHISHING

• It is a deceitful practice of trying to get confidential information such as passwords and


usernames, and credit card details by making it appear as if it comes from a trustworthy
source.

• It is usually done through emails or using popular entity such as Microsoft, Yahoo, Google,
Amazon, and financial institutions.

EMAIL SPOOFING

• Usually, unsolicited commercial email sent from an unknown source with identical message
sent to multiple recipients.

• Usually not dangerous but can be time and space consuming.

• Dangerous ones can carry viruses and other malicious software (Malware)

PHARMING

• This is a dangerous hacker attack on a website which directs all traffic to that website to
another fictitious website.

• A scamming practice in which malicious code is installed on a personal computer or server,


misdirecting users to fraudulent Web sites without their knowledge or consent. Pharming has
been called "phishing without a lure.”

• The main objective is to obtain username and passwords, as well as credit cards ad financial
information, and use these to steal their money electronically or use the credit cards of the
victims.

• It is a major concern of many online banking and electronic commerce transactions.


HACKER

• This is a person who is able to enter and control other people’s computer without
authorization.

• Usually vandalizes the victims’ website, steals personal information, obtains intellectual
property, and performs credit card fraud.

• Firewalls are able to prevent entry by hackers.

SOME TIPS TO STAY SAFE ONLINE

• Be mindful on what you share online.

• Do not just accept terms and conditions, read it.

• Do not share your password with anyone.

• Do not talk to strangers whether online or face-to-face.

• Never post anything about future vacation.

• Add friends you know in real life.

• Avoid visiting untrusted websites.

• If you have Wi-Fi at home, make it private by adding a password.

• Install and update an antivirus software on your computer.

• Avoid downloading anything from untrusted websites.

• Do not reply or click links from suspicious emails.

Cybercrime

A crime in which computer is used as object and tool in committing a crime such hacking,
phishing, spamming, child pornography, libel, hate crimes, identity thief and others.

Cybercrime Law

A law that deals with all forms of cybercrime.


Netiquette

It is a word that came from the two words “net” and “etiquette”. It is an etiquette applied online
that shows proper manner and behavior. If you are a member of an online society through
social media, you are called netizen. And in interacting with other netizen online, we need to
maintain good behavior which is acceptable to others in online community.

The Core Rules of Netiquette by Seth T. Ross

1. Remember the Human

2. Adhere to the same standard behavior online that you would follow in real life

3. Know where you are in cyberspace

4. Respect other people’s time and bandwidth

5. Make yourself look good online

6. Share expert knowledge

7. Help keep Flame wars under control

8. Respect other people’s privacy

9. Don’t abuse your power

10. Be forgiving of other people’s mistake

THINK BEFORE YOU CLICK!


E-TECH NOTES | M1 LESSON 3 | CONTEXTUALIZED ONLINE SEARCH AND RESEARCH SKILLS

SEARCH ENGINES

Internet Research - It is a research method in collecting and gathering information via internet
by using search engine such as google.

Search Engine - A software system designed to search the internet for information by entering
keyword of phrase.

CRAWLER-BASED - Uses spider or a crawler to search the Internet.

DIRECTORY - Depend on human editors to create their listings or database.

2 Directories:

• Academic and Professional

• Commercial and Portal

HYBRID - Uses both crawler based and directory

META - Transmit user supplied keywords simultaneously to several individual search engines to
carry out the search.

TIPS TO CONSIDER IN SEARCHING

Searching the Web

Getting the correct and reliable information is our goal in internet research. We may rely
on the capability of search engine but sometimes it may not give us the correct information
because of the keywords we entered into a search engine. There are techniques in searching
information that can be applied in search engine in order to get a better result. Some search
engines allow combination of words and logic connectors of AND, OR, and NOT.

Tips for Effective Internet Research by George Mathews

1. Know what kind of research you want to do.


2. Make a list of keywords you will use in your search.
3. Enclose keywords in quotation marks.
4. Use the minus sign (-).
5. Try specialized search engines.
6. Skim through search results web pages.
7. Bookmark
8. Review your bookmarks.
Online Research Skills by Hannah Trierweiler Hudson

1. Check Your Source


2. Ask Good Questions
3. Go Beyond the Surface
4. Be Patient
5. Respect Ownership
6. Use Your Networks

Tips to Consider in searching:

1. Use of Keyword
2. Use of Phrases
3. Capitalization
4. Boolean Logic
5. Wildcards and Truncation

Use of Keywords

• Preferably nouns and objects

• Avoid verbs and use modifiers only when they help to define your object most precisely

Use of Phrases

• Most powerful keyword

• Combination of two or more words

Capitalization

• When searching proper names, use capital or uppercase to narrow the search

Boolean Logic

• Reasonable number of results and increase the chance of a useful outcome

Wildcards and Truncation

• Substituting symbols for certain letter of a word

• “wom*n” will result to “woman” and “women”


Advantages

1. Ability to obtain a large sample, which increases statistical power.


2. Data is automatically coded so no data entry errors.
3. Reduced cost of conducting research.

Disadvantages

1. Online is not totally secure and theft is one of the numerous dangers it poses,
researchers personal information is at risk of being access by rogue persons.
2. Some of the materials on the internet have not been evaluated by experts or
thoroughly screened.
3. Lack of accreditation and low quality.

IMPORTANT ASPECTS OF RESEARCH

• Research design covers the key issues in developing a successful research project.

• Research methods takes you to resources on essential techniques for carrying out convincing
research.

• Working with data will provide resources on the use of statistics and other numerical skills in
research.

COPYRIGHT

Copyright Issues

- There are millions of information that we can get from the internet. Some of this
information are free but others are not. They are protected by a copyright law.

What is Copyright?

Copyright is a protection given to the owner of the rights in an original work such as books,
musical works, films, paintings, and other works, and computer programs. This original work is
called intellectual property which is protected under Republic Act 8293 known as the
“Intellectual Property Code of the Philippines”.

Copyright Infringement

This happens when the copyrighted work is use by other person without permission of the
author or copyright holder. Any person who is infringing the right protected work would be
liable under the law. An example of this is the case of M.Y. Intercontinental Trading Corporation
(MITC), Tedwin T. Uy, Allianz Marketing and Publishing Corp. (Allianz), and Fujian New
Technology Color Making and Printing Company, LTD (Fujian) against St.
Mary’s Publishing Corporation (SMPC). Manila regional trial court ordered Fujian and its
partners to pay P24.7 million for the damages and cost of litigation for copyright infringement
to SMPC. Fujian and its three local partners was guilty of printing, copying, reproducing,
importing, distributing and selling of original and revised textbooks that they have illegally sold
to Department of Education in Zamboanga, Municipality of Cabuyao in Laguna and Municipality
of Matnog in Sorsogon without the approval of SMPC, the copyright owner of the textbooks.

Fair Use

Research is important to the students and other people. Most of them rely on the information
that they can get online. Although this information is protected by a copyright law but we can
still use this information without permission in a limited way under certain condition and
purpose. Fair use is the use of copyrighted material for comment, teaching, criticism, news
reporting, research, scholarship, and other similar purpose is not an infringement of copyright.
Example of this is when you post a quote from a person in your Facebook wall. Include the
name of person who owns the quote in your post. Another example is when you copy image
from internet, give credit to the creator of image. The copied image should be use for
educational purpose not for commercial use. In fair use, 5% of the content of reference can
only be copied. If 20% or less of reference copied, there must be a secondary use agreement
and fee. And if 20% or more of reference copied, it requires purchasing of creative work.

Guidelines for Fair Use

1. Majority of the contents created must be yours.

2. Give credit to the owner.

3. Don’t make profit of the copyrighted work


E-TECH NOTES | M2 LESSON 1 | MICROSOFT WORD

MS WORD BASIC FORMATTING

HOME TAB INSERT TAB DESIGN TAB PAGE REFERENCES ADVANCED


LAYOUT TAB TAB FUNCTIONS
Font Tables Watermark Margin Insert citation Mail
merging
Font size Images Page color Orientation Generate
references
Font style Graphs Page borders Paper size
(Bold, Italic,
Underline)
Text color Diagram Colmns
(SmartArt)
Text Comment
alignment
Find and Header and
replace Footer
Line and Page
paragraph Number
spacing

HOW TO USE MAIL MERGE:

1. Click the MAILINGS tab.


2. Click the START MAIL MERGE Command.
3. Choose the document type.
4. Click the SELECT RECIPIENTS command.
5. Choose your LIST REFERENCE (create or use an existing file)
6. Determine the placement of the information.
7. Click the INSERT MERGE FIELD command (dropdown arrow)
8. Choose the MERGE FIELD you want to insert.
9. Preview and check your result.
10. Click the FINISH and MERGE command.
11. Choose the desired options (Edit Individual Documents).
E-TECH NOTES | M2 LESSON 2 | MICROSOFT POWERPOINT

Encoding data: MS WORD


Presenting data: MS PPT

Basic Formatting:

HOME INSERT DESIGN TRANSITIONS ANIMATIONS SLIDE REVIEW


TAB TAB TAB TAB TAB SHOW TAB
TAB
Font Tables Slide Slide Entrance Preview Spelling
designs transitions effects
Font size Images Slide size Effect options Emphasis Set up Research
effects slide show
Font style Graphs Format Sound Exit effects Timings Thesaurus
background
Text color Diagram Duration Motion paths Recordings Language
and
alignment
Layout Audio and Advance slide Animation Compare
video Pane
New slide
Hyperlink

You might also like